Section:  .. / 0408-exploits  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 55
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: ipd-dos.c
Description:
Proof of concept local exploit that makes use of a denial of service vulnerability in IPD (Integrity Protection Driver) versions up to 1.4.
Homepage:http://www.ngsec.com/
Related File:NGSEC-2004-6.txt
File Size:587
Last Modified:Aug 18 02:38:48 2004
MD5 Checksum:8f05377a58dbd525f67cc5a025e9b27f

 ///  File Name: isec-0016-procleaks.txt
Description:
A critical security vulnerability has been found in the Linux kernel code handling 64bit file offset pointers. Successful exploitation allows local users to have access to kernel memory. Kernel series affected are 2.4.26 and below and 2.6.7 and below. Full exploit provided.
Author:Paul Starzetz
Homepage:http://isec.pl/vulnerabilities/isec-0016-procleaks.txt
File Size:10200
Related CVE(s):CAN-2004-0415
Last Modified:Aug 5 08:20:29 2004
MD5 Checksum:84d0043e4136ab7bb3a0512bab553ed4

 ///  File Name: keeneTraversal102.txt
Description:
Keene Digital Media Server version 1.0.2 is susceptible to a directory traversal attack due to a lack of sufficient input validation.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:1573
Last Modified:Aug 31 02:02:28 2004
MD5 Checksum:8a2171fc611f46b35b2c5ec61ae7895a

 ///  File Name: mailenable.txt
Description:
Denial of service exploit that makes use of a buffer overflow in an overly long Content-Length: setting for MailEnable Professional HTTPMail version 1.19 on Windows.
Author:CoolICE
File Size:735
Last Modified:Aug 5 06:43:41 2004
MD5 Checksum:2e41cdebc703729dc320e6caf9c7f1d2

 ///  File Name: merak527.txt
Description:
Merak Webmail server version 5.2.7 has cross site scripting, full path disclosure, exposure of PHP files, and SQL injection vulnerabilities.
Homepage:http://www.criolabs.net
File Size:6690
Last Modified:Aug 19 08:49:48 2004
MD5 Checksum:d99db9f9afb9b41de3696570604d53af

 ///  File Name: musicDaemon.txt
Description:
MusicDaemon versions 0.0.3 and below suffer from a remote denial of service and flaw where /etc/shadow can be extracted. Exploit included.
Author:Tal0n
File Size:5205
Last Modified:Aug 24 10:22:26 2004
MD5 Checksum:d6c7ee7b0ef2783d63261d968b4b0338

 ///  File Name: MyDMS.txt
Description:
MyDNS is susceptible to a SQL injection and directory traversal attack that allows for arbitrary file download. Version 1.4.2 fixes the SQL injection bug while the other bug is in all releases.
Author:Joxean Koret
File Size:1892
Last Modified:Aug 24 08:54:18 2004
MD5 Checksum:aec2e2241221fc1f8af47d957188900d

 ///  File Name: neb-citadel.c
Description:
Remote exploit for Citadel/UX versions 6.23 and below that makes use of the USER directive overflow. Successful exploitation adds an account in /etc/passwd.
Author:nebunu
Related Exploit:citadel.advisory-04.txt"
File Size:4397
Last Modified:Aug 31 05:12:05 2004
MD5 Checksum:20fc661867702ea3aa6a9c1ade96752b

 ///  File Name: netgearDG834G.txt
Description:
The Netgear DG834G has a hardcoded root password of zebra and a debug mode that allows for an immediately available rootshell.
Author:thanasonic
File Size:389
Last Modified:Aug 13 09:22:11 2004
MD5 Checksum:566c07b43d6e4f8a91bc7660bf5a22c8

 ///  File Name: networkEverywhere.txt
Description:
NetworkEverywhere router Model NR041 suffers a script injection over DHCP vulnerability. Full exploitation provided.
Author:Mathieu Lacroix
File Size:3330
Last Modified:Aug 26 22:14:45 2004
MD5 Checksum:4e30ea5cc16c13a7d52355734ec9e5a1

 ///  File Name: openf.c
Description:
Remote root exploit for Linux that makes use of a format string vulnerability in OpenFTPD versions up to 0.30.2.
Author:infamous42md
Related File:VSA0402.txt
File Size:7625
Last Modified:Aug 5 06:56:03 2004
MD5 Checksum:a5f332a7351b6bd7276204346dd6af78

 ///  File Name: page.txt
Description:
Some page.cgi script allows for remote arbitrary code execution.
File Size:272
Last Modified:Aug 7 22:32:01 2004
MD5 Checksum:dba9084cf9bb0b61f21f1cb7bed73d87

 ///  File Name: painkex.zip
Description:
Test exploit for Painkiller versions 1.3.1 and below that makes use of a memory corruption flaw.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:painkiller131.txt
File Size:11053
Last Modified:Aug 26 21:25:27 2004
MD5 Checksum:ae28b5004823fe6e14ce53b57a383cf1

 ///  File Name: pavukWebSpider.c
Description:
Exploit that makes use of the buffer overflow in the Digest authentication code of Pavuk 0.x.
Author:infamous42md
Related File:GLSA200407-19.txt
File Size:9323
Last Modified:Aug 7 22:38:03 2004
MD5 Checksum:d4cd6b4735eacd63019952f6e7d99828

 ///  File Name: pngslap.c
Description:
Exploit that makes use of the flaw in libpng versions 1.2.5 and below.
Author:infamous42md
Related File:TA04-217A.txt
File Size:3247
Last Modified:Aug 12 09:33:17 2004
MD5 Checksum:6f73c9777a9de956305785d7d940d747

 ///  File Name: priv8afp.pl
Description:
Remote root exploit for Mac OS X versions 10.3.3, 10.3.2, and 10.2.8 that makes use of the stack buffer overflow in the Apple Filing Protocol (AFP).
Author:wsxz
Homepage:http://priv8security.com/
Related File:a050304-1.txt
File Size:5635
Related CVE(s):CAN-2004-0430
Last Modified:Aug 13 09:07:53 2004
MD5 Checksum:bbbe1166882492c6bc1c08114608607a

 ///  File Name: proc_kmem_dump.c
Description:
Proc_kmem_dump is a local exploit for Linux kernels v2.4.0 through 2.4.26 which allows unprivileged users to read kernel memory.
Author:iSEC Security Research
Homepage:http://www.isec.pl
Related File:sa11464.txt
File Size:4426
Related CVE(s):CAN-2004-0415
Last Modified:Aug 16 23:01:59 2004
MD5 Checksum:4e4c9ea003e90ea4ebbae9c9d4f5978d

 ///  File Name: PST_chpasswd_exp-v_b.c
Description:
Squirrelmail chpasswd local root bruteforce exploit.
Author:Bytes
Homepage:http://www.ph4nt0m.net
File Size:2579
Last Modified:Aug 26 20:24:30 2004
MD5 Checksum:0ba65553e32acb0b39e0e99b0cfc8e50

 ///  File Name: qt_bmpslap.c
Description:
Heap overflow exploit for the qt BMP parsing bug foundd in versions 3.3.2.
Author:infamous42md
Related File:CESA-2004-004.txt
File Size:5509
Last Modified:Aug 24 09:08:09 2004
MD5 Checksum:5e8e6c1e1eec51f034ae2b8459d28bb4

 ///  File Name: servu3x.c
Description:
Serv-u local exploit that achieves SYSTEM privileges using an old known buffer overflow. Tested against version 5.1.0.0. Lower versions are also susceptible.
Author:at4r
File Size:8170
Last Modified:Aug 10 05:04:58 2004
MD5 Checksum:d85139f7a45caf74cc51eef3538fec88

 ///  File Name: soxWAVFileBufferOverflowExploit.c
Description:
Local exploit that makes use of the WAV header handling vulnerability in SoX versions 12.17.4-r1 and below.
Author:rave, Angelo Rosiello
Homepage:http://www.rosiello.org/
File Size:7362
Related CVE(s):CAN-2004-0557
Last Modified:Aug 4 09:42:17 2004
MD5 Checksum:21705b0d1b4c588532f4cde4b2dd90b4

 ///  File Name: thttp207.txt
Description:
thttpd version 2.07 beta 0.4 on Windows is susceptible to a directory traversal attack.
Author:CoolICE
File Size:699
Last Modified:Aug 5 08:59:45 2004
MD5 Checksum:76ab3004bc6b69223623137274e055ac

 ///  File Name: upnpboom.c
Description:
UPNP mass infector exploit.
Author:Anonymous
File Size:8078
Last Modified:Aug 9 23:45:41 2004
MD5 Checksum:89913b84303ba309853fdf491d28198c

 ///  File Name: wdExec.txt
Description:
Williams Database Page Parser version 1.0 allows for arbitrary code execution due to a lack of input validation.
Author:Francisco Alisson
File Size:325
Last Modified:Aug 10 02:06:03 2004
MD5 Checksum:417a9936b9c6a92e70923a4f7effbbdf

 ///  File Name: webapp.traversal.txt
Description:
WebAPP is susceptible to a directory traversal attack and another flaw that allows an attacker the ability to retrieve the DES encrypted password hash of the administrator.
File Size:2039
Last Modified:Aug 26 21:14:47 2004
MD5 Checksum:d6c340b9a08828edc0ca782e1187cade